题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2024-03-29 01:54:28

[单项选择] By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones. What is the percentage of RF bandwidth that can be dedicated to the phones?()
A. 75 percent
B. 85 percent
C. 56 percent
D. 55 percent

更多"By default, on the&e"的相关试题:

[单项选择] By default, on the WLAN controller for a voice application using Cisco 7921 wireless IP phones. What is the percentage of RF bandwidth that can be dedicated to the phones?()
A. 75 percent
B. 85 percent
C. 56 percent
D. 55 percent
[多项选择] The default domain GPO in your company is configured by using the following account policy settings:   ( Minimum password length: 8 characters  .Maximum password age: 30 days. Enforce password history: 12 passwords remembered  .Account lockout threshold: 3 invalid logon attempts  .Account lockout duration: 30 minutes   You install Microsoft SQL Server on a computer named Server1 that runs Windows Server 2008 R2. The  SQL Server application uses a service account named SQLSrv. The SQLSrv account has domain user  rights.   The SQL Server computer fails after running successfully for several weeks. The SQLSrv user account is  not locked out.   You need to resolve the server failure and prevent recurrence of the failure.   Which two actions should you perform()
A. Reset the password of the SQLSrv user account.
B. Configure the local security policy on Server1 to grant the Logon as a service right on the SQLSrv user
C. Configure the properties of the SQLSrv account to Password never expires.
D. Configure the properties of the SQLSrv account to User cannot change password.
E. Configure the local security policy on Server1 to explicitly grant the SQLSrv user account the allow  logon locally user right.
[单项选择] You configured the default backup device type as disk for RMAN backups. In your database,because of business requirements,you have to take a simultaneous duplicate backup of the data files when the RMAN BACKUP command is used.  What must you set using the RMAN CONFIGURE command to achieve this?()  
A.  MAXSETSIZE TO 2
B.  DEVICE TYPE DISK PARALLELISM 2
C.  RETENTION POLICY TO REDUNDANCY 2
D.  DATAFILE BACKUP COPIES FOR DEVICE TYPE DISK TO 2
[单项选择] switch (i) {  default:   System.out.printIn(“Hello”);   }  What is the acceptable type for the variable i?()  
A.  Byte
B.  Long
C.  Float
D.  Double
E.  Object
F.  A and B
G.  C and D
[多项选择] switch (i)  {  default:  System.out.printIn(“Hello”);  )   What are the two acceptable types for the variable i?()  
A.  Char
B.  Byte
C.  Float
D.  Double
E.  Object
[多项选择] Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
A. DNS traffic is denied.
B. HTTP traffic is denied.
C. FTP traffic is permitted.
D. SMTP traffic is permitted.
[单项选择] By default,on the wlan controller for a voice application using cisco 7921 wireless ip phones. what is the percentage of rf bandwidth that can be dedicated to the phones?()
A. 75 percent
B. 85 percent
C. 56 percent
D. 55 percent
[多项选择] switch(x) {  default:  System.out.println(“Hello”);  }  Which two are acceptable types for x?() 
A.  byte
B.  long
C.  char
D.  float
E.  Short
F.  Long
[单项选择] Given that c is a reference to a valid java.io.Console object, and: 11.String pw = c.readPassword("%s", "pw: "); 12.System.out.println("got " + pw); 13.String name = c.readLine("%s", "name: "); 14.System.out.println(" got ", name); If the user types fido when prompted for a password, and then responds bob when prompted for a name,what is the result?()
A. An exception is thrown at runtime
B. pw: fido got fido name: bob got bob
C. pw: got fido name: bob got bob
D. Compilation fails.
[单项选择] You want to monitor and control the resource usage by sessions. You want to be warned automatically when more than 100 sessions are opened with your database.  What action would you take to achieve this?()
A. Use the Database Resource Manager.
B. Set the limits in the profiles used by users.
C. Modify the SESSIONS initialization parameter.
D. Set the warning threshold for the Current Logons Count metric.
[单项选择] A log logical volume is created as indicated below: root@host1:/# mklv -a c -t jfs2log -b y datavg 1   loglv00   root@host1:/# lsvg -l datavg datavg:   LV NAMETYPELPsPPsPVsLV STATEMOUNT POINT   loglv00jfs2log111closed/syncdN/A   A new filesytem is then created using the new log logical volume.When the administrator attempts to mount the filesytem, the following error occurs: root@host1:/# mount /newfs   mount: 0506-324 Cannot mount /dev/lv00 on /newfs: A system call received a parameter that is not valid. Which of the following actions will resolve this error?()
A. Recreate the file system with -p rw flags and re-mount.
B. Run ‘logform /dev/loglv00’ and hit ‘y’ to destroy all data.
C. Run ‘clrginfo -p’ to clear the invalid filesystem parameter.
D. Change ‘account = true’ value in /etc/filesystem to ‘account = false’.
[单项选择] A customer has two data centers, 500 kilometers apart. The customer requests a proposal for new storage subsystems and a disaster recovery solution that provides consistent data in the event of a disaster at the local site.  Which IBM System Storage DS8000 solution should the storage  specialist propose to the client()
A. Metro/Global Mirror
B. Metro Mirror
C. Global Copy
D. Global Mirror
[单项选择] You want to upgrade 400 computers from Windows 95 to Windows 2000 Professional. Most of the computers in your company use the same hardware.  However, several different peripheral devices are used throughout the company. You want to verify that the hardware in use is compatible to Windows 2000 Professional. You want to accomplish this with least amount of administrative effort.  What should you do?()
A.  Create several different computer configurations. Install Windows 2000 Professional and enable driver signing.
B.  Create a bootable floppy disk that contains and automatically runs winNT32.exe/checkupgradeOnlyQ. Send the floppy disk to each user on the network.
C.  Copy the contents of Windows 2000 Professional CD-ROM to a network share. From the network, modify your network logon scripts to run WinNT32.exe/Unattended:ReportOnly.
D.  Use setup manager to create a setup.inf file. Add the entry ReportOnly=Yes to the [Win9xUpg] section of the answer file. Run Winnt32.exe/unattended.setup.inf on all of the different computer configurations.
[单项选择] A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv.  Interface fastethernet 1/10  Switchport mode trunk  Switchport trunk allowed vlan all  Channel-group 10 mode on  No shut  Interface fastethernet 1/11   Switchport mode trunk  Switchport trunk allowed vlan all  Channel-group 10 mode on  No shut  Interface port-channel 10   Switchport mode trunk  Switchport allowed vlan all No shut  Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
A.  MAC pinning
B.  Cisco Discovery Protocol pinning
C.  Mode On
D.  Mode Active
E.  No port channel configuration
[单项选择] You need to protect the confidential data files on File2 against unauthorized offline access.   What should you use?()
A. Encrypting File System (EFS) on File2
B. file screens on Node1 and Node2
C. NTFS permissions on File2
D. Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码